Lucene search

K
githubGitHub Advisory DatabaseGHSA-XPC5-RR39-V8V2
HistorySep 18, 2024 - 10:05 p.m.

Mautic has an XSS in contact tracking and page hits report

2024-09-1822:05:59
CWE-79
GitHub Advisory Database
github.com
2
mautic
xss
contact tracking
page hits
report
vulnerability
patches
update
stored xss
patches
workaround
owasp
input validation
email
advisory
software

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

5.7

Confidence

High

EPSS

0.001

Percentile

18.3%

Summary

Prior to this patch, a stored XSS vulnerability existed in the contact tracking and page hits report.

Patches

Please update to 4.4.13 or 5.1.1 or later.

Workarounds

None

References

https://owasp.org/www-project-top-ten/2017/A7_2017-Cross-Site_Scripting_(XSS)
https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/02-Testing_for_Stored_Cross_Site_Scripting

If you have any questions or comments about this advisory:

Email us at [email protected]

Affected configurations

Vulners
Node
mauticcoreRange5.0.0-alpha5.1.1
OR
mauticcoreRange1.0.0-beta44.4.13
OR
mauticcore-libRange5.0.0-alpha5.1.1
OR
mauticcore-libRange1.0.0-beta44.4.13
VendorProductVersionCPE
mauticcore*cpe:2.3:a:mautic:core:*:*:*:*:*:*:*:*
mauticcore-lib*cpe:2.3:a:mautic:core-lib:*:*:*:*:*:*:*:*

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

5.7

Confidence

High

EPSS

0.001

Percentile

18.3%

Related for GHSA-XPC5-RR39-V8V2